I spent some time over the weekend catching up on my reading re: Groove and, in particular, its security architecture. I came away with a new respect for the approach that Ray Ozzie and his team have taken with Groove. If you’re also interested in this subject, read, in particular, the chapter excerpted from O’Reilly’s Peer to Peer book for an excellent explanation of what’s going on.
Categories